CVE-2025-68725
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
26/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Do not let BPF test infra emit invalid GSO types to stack<br />
<br />
Yinhao et al. reported that their fuzzer tool was able to trigger a<br />
skb_warn_bad_offload() from netif_skb_features() -> gso_features_check().<br />
When a BPF program - triggered via BPF test infra - pushes the packet<br />
to the loopback device via bpf_clone_redirect() then mentioned offload<br />
warning can be seen. GSO-related features are then rightfully disabled.<br />
<br />
We get into this situation due to convert___skb_to_skb() setting<br />
gso_segs and gso_size but not gso_type. Technically, it makes sense<br />
that this warning triggers since the GSO properties are malformed due<br />
to the gso_type. Potentially, the gso_type could be marked non-trustworthy<br />
through setting it at least to SKB_GSO_DODGY without any other specific<br />
assumptions, but that also feels wrong given we should not go further<br />
into the GSO engine in the first place.<br />
<br />
The checks were added in 121d57af308d ("gso: validate gso_type in GSO<br />
handlers") because there were malicious (syzbot) senders that combine<br />
a protocol with a non-matching gso_type. If we would want to drop such<br />
packets, gso_features_check() currently only returns feature flags via<br />
netif_skb_features(), so one location for potentially dropping such skbs<br />
could be validate_xmit_unreadable_skb(), but then otoh it would be<br />
an additional check in the fast-path for a very corner case. Given<br />
bpf_clone_redirect() is the only place where BPF test infra could emit<br />
such packets, lets reject them right there.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (incluyendo) | 5.10.249 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.199 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.162 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.122 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.68 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.2 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/04a899573fb87273a656f178b5f920c505f68875
- https://git.kernel.org/stable/c/0f3a60869ca22024dfb9c6fce412b0c70cb4ea36
- https://git.kernel.org/stable/c/768376ece7036ecb8604961793a1b72afe6345dd
- https://git.kernel.org/stable/c/8670b53b8ee91f028f7240531064020b7413c461
- https://git.kernel.org/stable/c/bb7902ed7d7f6d6a7c6c4dc25410d6127ce1085f
- https://git.kernel.org/stable/c/e0ffb64a2d72c6705b4a4c9efef600409f7e98a0
- https://git.kernel.org/stable/c/fbea4c63b5385588cb44ab21f91e55e33c719a54



